aboutsummaryrefslogtreecommitdiff
path: root/rpcapd
diff options
context:
space:
mode:
authorFrancois-Xavier Le Bail <devel.fx.lebail@orange.fr>2020-12-12 15:58:48 +0100
committerFrancois-Xavier Le Bail <devel.fx.lebail@orange.fr>2020-12-12 15:59:40 +0100
commitcb69b4d7bd006559e501ac1bdf7f92e12579a4b3 (patch)
tree48164ca841725fb3bda2b963b3146e9586af5180 /rpcapd
parentbcd6c3fe46716a87bfd9c8b090e8129787e4c73a (diff)
Fix some typos
[skip ci]
Diffstat (limited to 'rpcapd')
-rw-r--r--rpcapd/daemon.c10
-rw-r--r--rpcapd/rpcapd.c4
2 files changed, 7 insertions, 7 deletions
diff --git a/rpcapd/daemon.c b/rpcapd/daemon.c
index 7a31a2b3..620dec31 100644
--- a/rpcapd/daemon.c
+++ b/rpcapd/daemon.c
@@ -395,7 +395,7 @@ daemon_serviceloop(SOCKET sockctrl, int isactive, char *passiveClients,
if (sock_send(sockctrl, NULL, (char *) &tls_header,
TLS_RECORD_HEADER_LEN, errbuf, PCAP_ERRBUF_SIZE) == -1)
{
- // That failed; log a messsage and give up.
+ // That failed; log a message and give up.
rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
goto end;
}
@@ -405,7 +405,7 @@ daemon_serviceloop(SOCKET sockctrl, int isactive, char *passiveClients,
if (sock_send(sockctrl, NULL, (char *) &tls_alert,
TLS_ALERT_LEN, errbuf, PCAP_ERRBUF_SIZE) == -1)
{
- // That failed; log a messsage and give up.
+ // That failed; log a message and give up.
rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
goto end;
}
@@ -1377,7 +1377,7 @@ daemon_msg_auth_req(struct daemon_slpars *pars, uint32 plen)
// Send the reply.
if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1)
{
- // That failed; log a messsage and give up.
+ // That failed; log a message and give up.
rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
return -1;
}
@@ -2423,7 +2423,7 @@ daemon_msg_updatefilter_req(uint8 ver, struct daemon_slpars *pars,
if (sock_send(pars->sockctrl, pars->ssl, (char *) &header, sizeof (struct rpcap_header), pcap_geterr(session->fp), PCAP_ERRBUF_SIZE))
{
- // That failed; log a messsage and give up.
+ // That failed; log a message and give up.
rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
return -1;
}
@@ -2473,7 +2473,7 @@ daemon_msg_setsampling_req(uint8 ver, struct daemon_slpars *pars, uint32 plen,
if (sock_send(pars->sockctrl, pars->ssl, (char *) &header, sizeof (struct rpcap_header), errbuf, PCAP_ERRBUF_SIZE) == -1)
{
- // That failed; log a messsage and give up.
+ // That failed; log a message and give up.
rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
return -1;
}
diff --git a/rpcapd/rpcapd.c b/rpcapd/rpcapd.c
index 206181e7..b91a401e 100644
--- a/rpcapd/rpcapd.c
+++ b/rpcapd/rpcapd.c
@@ -1161,7 +1161,7 @@ accept_connection(SOCKET listen_sock)
break;
}
- // The accept() call can return this error when a signal is catched
+ // The accept() call can return this error when a signal is caught
// In this case, we have simply to ignore this error code
// Stevens, pg 124
#ifdef _WIN32
@@ -1388,7 +1388,7 @@ main_active(void *ptr)
hostlist_copy, nullAuthAllowed, uses_ssl);
}
- // If the connection is closed by the user explicitely, don't try to connect to it again
+ // If the connection is closed by the user explicitly, don't try to connect to it again
// just exit the program
if (activeclose == 1)
break;